TY - GEN
T1 - Probability model transforming encoders against encoding attacks
AU - Cheng, Haibo
AU - Zheng, Zhixiong
AU - Li, Wenting
AU - Wang, Ping
AU - Chu, Chao Hsien
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Honey encryption (HE) is a novel encryption scheme for resisting brute-force attacks even using low-entropy keys (e.g., passwords). HE introduces a distribution transforming encoder (DTE) to yield plausible-looking decoy messages for incorrect keys. Several HE applications were proposed for specific messages with specially designed probability model transforming encoders (PMTEs), DTEs transformed from probability models which are used to characterize the intricate message distributions. We propose attacks against three typical PMTE schemes. Using a simple machine learning algorithm, we propose a distribution difference attack against genomic data PMTEs, achieving 76.54%-100.00% accuracy in distinguishing real data from decoy one. We then propose a new type of attack-encoding attacks-against two password vault PMTEs, achieving 98.56%-99.52% accuracy. Different from distribution difference attacks, encoding attacks do not require any knowledge (statistics) about the real message distribution. We also introduce a generic conceptual probability model-generative probability model (GPM)-to formalize probability models and design a generic method for transforming an arbitrary GPM to a PMTE. We prove that our PMTEs are information-theoretically indistinguishable from the corresponding GPMs. Accordingly, they can resist encoding attacks. For our PMTEs transformed from existing password vault models, encoding attacks cannot achieve more than 52.56% accuracy, which is slightly better than the randomly guessing attack (50% accuracy).
AB - Honey encryption (HE) is a novel encryption scheme for resisting brute-force attacks even using low-entropy keys (e.g., passwords). HE introduces a distribution transforming encoder (DTE) to yield plausible-looking decoy messages for incorrect keys. Several HE applications were proposed for specific messages with specially designed probability model transforming encoders (PMTEs), DTEs transformed from probability models which are used to characterize the intricate message distributions. We propose attacks against three typical PMTE schemes. Using a simple machine learning algorithm, we propose a distribution difference attack against genomic data PMTEs, achieving 76.54%-100.00% accuracy in distinguishing real data from decoy one. We then propose a new type of attack-encoding attacks-against two password vault PMTEs, achieving 98.56%-99.52% accuracy. Different from distribution difference attacks, encoding attacks do not require any knowledge (statistics) about the real message distribution. We also introduce a generic conceptual probability model-generative probability model (GPM)-to formalize probability models and design a generic method for transforming an arbitrary GPM to a PMTE. We prove that our PMTEs are information-theoretically indistinguishable from the corresponding GPMs. Accordingly, they can resist encoding attacks. For our PMTEs transformed from existing password vault models, encoding attacks cannot achieve more than 52.56% accuracy, which is slightly better than the randomly guessing attack (50% accuracy).
UR - http://www.scopus.com/inward/record.url?scp=85076180822&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85076180822&partnerID=8YFLogxK
M3 - Conference contribution
T3 - Proceedings of the 28th USENIX Security Symposium
SP - 1573
EP - 1590
BT - Proceedings of the 28th USENIX Security Symposium
PB - USENIX Association
T2 - 28th USENIX Security Symposium
Y2 - 14 August 2019 through 16 August 2019
ER -